Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/05/2024, 13:44

General

  • Target

    $PLUGINSDIR/dlmgn.exe

  • Size

    369KB

  • MD5

    3c8fcdd5824e8194f999e9ca50c3c751

  • SHA1

    89ffa620df2c41641dcb4af815c0e381dcd2a4da

  • SHA256

    9c362ee61694e130bd904bfcf7c32c33851ab106e5b0121f800c31e42636d870

  • SHA512

    dc6b2ceb1b2847f53f866a154a6ace2faf3782ce74df4ed3920fbc73994796d0518bc1ef06648d4800e1ace8462d1af11cdb8b5ecbbf2d5d3389e2a439764f2d

  • SSDEEP

    6144:CRhs1cwmi3K1L9E5ThjLhBj7JpKlgGOaGznraFJhn6I7:CDs+wmiKw1nfK1OucI7

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dlmgn.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dlmgn.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Modifies system certificate store
    PID:4472

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4472-0-0x00007FFA94CB5000-0x00007FFA94CB6000-memory.dmp

          Filesize

          4KB

        • memory/4472-1-0x00007FFA94A00000-0x00007FFA953A1000-memory.dmp

          Filesize

          9.6MB

        • memory/4472-10-0x000000001B600000-0x000000001B610000-memory.dmp

          Filesize

          64KB

        • memory/4472-13-0x000000001C4D0000-0x000000001C99E000-memory.dmp

          Filesize

          4.8MB

        • memory/4472-14-0x000000001CA40000-0x000000001CADC000-memory.dmp

          Filesize

          624KB

        • memory/4472-16-0x00007FFA94A00000-0x00007FFA953A1000-memory.dmp

          Filesize

          9.6MB